Hacker Shows How Easily People Can Be Hacked While Walking Around in Public

Internet of Things (IoT) are said to be the new trend which are wifi enabled device used in offices and homes at large scale like smartphones, coffee makers, printers etc. These Iot Devices can be easily connected to your network and can be operated from anywhere in the world.

As technology is growing very fast and so Iot Devices also at great speed giving attackers good number of entry doors to enter your network to affect you. Hackers can use your IoT devices to gain backdoor entry to your network, allowing them to steal important and confidential data, like your personal information, banking details etc.

Jayson Street, renowned ethical hacker who had recently demonstrated an attack scenario said that only all its required is to walk with the right devices to hack into someone’s smart devices.

Below is the video showing how easily smartphones and smart devices can be hacked in Public by setting up EvilAp Malcious Access Point.

Jayson used a simple penetration testing device and an internet connection to hack people nearby him. The hacking device used by him automatically set up an ‘Evil Twin Attack,’ in which the hacker fools wifi users by connecting their smartphones and laptops to an malicious hotspot pretending as a legitimate WiFi provider.

Once the smart devices are connected to the malicious hotspot, all of the date flows directly into the hacker’s device, allowing hackers to secretly spy on the network and steal important passwords and other sensitive data.

How Such Evil Twin WiFi Attacks Can be Avoided :

Pwnie Express released its yearly report on 2017 Internet of Evil Things, providing views & insights on products that the IT professionals should be cautious. Below are the four steps you can implement in order to prevent yourself or your office from being hacked.

1. Turn off Wi-Fi in Smart Devices when you are not using them

2. If you have purchased a new smart device, turn off the functions you aren’t using.

3. Never to use the default passwords. Set up strong, secure passwords to secure your devices and keep changing credentials regularly.

4. Research before you purchase, what you’re buying and keep firmware & software updated associated with that device.